summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2010-0435
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2011-01-30 11:29:31 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2011-01-30 11:29:31 +0000
commitd3f3145fd890f6769590bc132bb0d7edf80fafd5 (patch)
treeb1a9e417ea6b5d8bd58e49ada34a9c384232c03d /retired/CVE-2010-0435
parent7196d474f645fb167632797b8734e11993260232 (diff)
retire issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2178 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2010-0435')
-rw-r--r--retired/CVE-2010-043515
1 files changed, 15 insertions, 0 deletions
diff --git a/retired/CVE-2010-0435 b/retired/CVE-2010-0435
new file mode 100644
index 00000000..a03973d0
--- /dev/null
+++ b/retired/CVE-2010-0435
@@ -0,0 +1,15 @@
+Candidate: CVE-2010-0435
+Description:
+ kvm null ptr dereference
+References:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0435
+Notes:
+ jmm> RHEL patch commited as patches/CVE-2010-0435-kvm-kernel-fix-null-pointer-dereference.patch
+ jmm> The kernel.org version is quite different, though. Maybe it's only exploitable in
+ jmm> combination with the plethora of KVM patches added by Red Hat?
+Bugs:
+upstream: released (2.6.34)
+2.6.32-upstream-stable: released (2.6.32.27)
+linux-2.6: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/x86/kvm-vmx-fix-vmx-null-pointer-dereference-on-debug-register-access.patch]
+2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]

© 2014-2024 Faster IT GmbH | imprint | privacy policy